Static task
static1
Behavioral task
behavioral1
Sample
be84fe5d908341f907497e8b5cba4e574e8c3bb4889daf7ba2c398c4eb6871e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be84fe5d908341f907497e8b5cba4e574e8c3bb4889daf7ba2c398c4eb6871e7.exe
Resource
win10v2004-20220812-en
General
-
Target
be84fe5d908341f907497e8b5cba4e574e8c3bb4889daf7ba2c398c4eb6871e7
-
Size
166KB
-
MD5
5acebd355449a6cd5a4136c15446729e
-
SHA1
f3edc8bca134c9afb87f79402c358b11acf2626c
-
SHA256
be84fe5d908341f907497e8b5cba4e574e8c3bb4889daf7ba2c398c4eb6871e7
-
SHA512
bb3d5d79a4045fd360d918dd5da3922c97c467069955184611b4cbe7079158fa7205eb7d5b3586478d41e4a716b78acdb3b46bba82b668e960a7c7853b8b3a9b
-
SSDEEP
3072:wPL5fjJKpLQ10ysf8Q3LHVCHWd8BVg4jZ9F1CmHfFV3JmV:wP2i7+1C2mbF1CEFi
Malware Config
Signatures
Files
-
be84fe5d908341f907497e8b5cba4e574e8c3bb4889daf7ba2c398c4eb6871e7.exe windows x86
cdb0477aef586220f5d968b0d4920884
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
GetDC
GetDesktopWindow
CharNextA
GetParent
GetSystemMetrics
kernel32
GetUserDefaultLangID
GetCurrentProcess
GetDriveTypeA
IsDebuggerPresent
lstrlenA
GlobalFindAtomW
GetOEMCP
GetCurrentThread
GetWindowsDirectoryA
GetTickCount
GetProcessHeap
lstrcmpA
GetStartupInfoA
GetACP
RemoveDirectoryA
GetVersion
GetThreadLocale
GetCurrentThreadId
GetCommandLineA
DeleteFileW
GetModuleHandleA
lstrcmpiA
DeleteFileA
MulDiv
SetCurrentDirectoryA
CopyFileA
QueryPerformanceCounter
GetCommandLineW
lstrlenW
GetModuleHandleW
GetConsoleOutputCP
GetCurrentProcessId
lstrcmpiW
GlobalFindAtomA
VirtualAlloc
VirtualFree
gdi32
SetTextAlign
SaveDC
CreatePalette
SetStretchBltMode
CreatePen
CreateFontIndirectA
CreateSolidBrush
SelectObject
LineTo
GetPixel
SetMapMode
RestoreDC
SetTextColor
PatBlt
DeleteDC
GetObjectA
GetDeviceCaps
CreateCompatibleDC
GetClipBox
DeleteObject
GetTextMetricsA
SelectPalette
RectVisible
GetStockObject
glu32
gluNurbsCallback
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Gnojbtxg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Ehouncop Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE